Archive | Countermeasures


27 July 2007 | 4,906 views

Babel Enterprise – Cross Platform System Auditing Tool

Babel Enterprise is a systems auditing tool. Babel performs a security level check of the machine, or hardening. The check consists of a number of auditing tests that obtain a snap of the security status of each machine. The result is a security index of the system that is given after each execution. It a […]

Continue Reading

01 June 2007 | 19,041 views

Sguil – Intuitive GUI for Network Security Monitoring with Snort

Sguil (pronounced sgweel) is probably best described as an aggregation system for network security monitoring tools. It ties your IDS alerts into a database of TCP/IP sessions, full content packet logs and other information. When you’ve identified an alert that needs more investigation, the sguil client provides you with seamless access to the data you […]

Continue Reading

31 May 2007 | 7,267 views

Google Acquires Web Security Startup GreenBorder

More Google News this week after Google Launches Online Security & Malware Blog, now they have acquired a web security startup called GreenBorder. Google Inc. said on Tuesday it has bought Internet security startup GreenBorder Technologies Inc., which creates secure connections to protect e-mail and Web users from malicious or unwanted computer code. Terms of […]

Continue Reading

25 May 2007 | 5,197 views

Consulting Licence Offer From Redseal – Security Risk Manager (SRM)

Redseal is launching a free offer next week for security consultants, pen testers and auditors. Redseal develops a product called Security Risk Manager (SRM), it does the following – (non sales overview) Imports firewall and router configuration files Audits and checks them for errors, mis configurations, redundant rules, checks against best practices etc Draws a […]

Continue Reading

11 May 2007 | 9,635 views

Outpost Security Suite PRO Review

Agnitum Outpost Security Suite Pro is a step up from their Agnitum Outpost Firewall PRO with a more wholistic look at security. The suite also includes pre-emptive threat protection, anti-spam protection and safe-surfing. The Software is fairly sizeable at around 36MB, you can download it here, for a 30 day free trial. As I’ve mentioned […]

Continue Reading

08 May 2007 | 4,936 views

GFI Free Endpoint Scanner – Online Portable Storage Device Scanning

Recently GFI launched a free, online portable storage device scanner called EndPointScan. EndPointScan, is an industry-first, free online service that allows anyone to check what devices are or have been connected to computers on their network and by whom. Using this diagnostic tool, one can identify those areas where the use of portable storage […]

Continue Reading

12 April 2007 | 4,824 views

Slavasoft FSUM and Hashcalc md5 & File Integrity for Windows

FSUM is a fast and handy command line utility for file integrity verification. It offers a choice of 13 of the most popular hash and checksum functions for file message digest and checksum calculation. You can easily use FSUM with a batch wrapper to do automated file integrity monitoring, and use something like blat to […]

Continue Reading

29 March 2007 | 7,024 views

Agnitum Outpost Firewall PRO Review

Agnitum Outpost Firewall Pro is a software based firewall I respect a lot, and used to actually use…It used to be fairly light weight, secure and had some good features the other firewalls at the time didn’t have (system file integrity checking and so on). But nowadays with NAT routers, the need for desktop firewalls […]

Continue Reading

22 March 2007 | 4,512 views

Check Point VPN-1 Power VSX NGX – Virtual Firewalls Get Clustered

Clustered Firewalls? What on earth next, beowulf IDS systems? Check Point has added cluster support and more granular controls to its virtual firewall software, memorably named Check Point VPN-1 Power VSX NGX. Virtual firewalls can now be distributed around a server cluster, with standby firewalls on alternative servers. System administrators can also shift processor power […]

Continue Reading

13 March 2007 | 8,765 views

PwdHash from Stanford – Generate Passwords by Hashing the URL

The Common Password Problem. Users tend to use a single password at many different web sites. By now there are several reported cases where attackers breaks into a low security site to retrieve thousands of username/password pairs and directly try them one by one at a high security e-commerce site such as eBay. As expected, […]

Continue Reading